Abstract
A system having Scalability is highly desirable since it promises a proportional performance boost subject to the resource increase provided. In this chapter we try to analyze the extent of scalability various cryptographic workloads can offer. We try to optimally map two eSTREAM (ECRYPT (2012) “eSTREAM: The European Network of Excellence in Cryptology (ECRYPT) Stream Cipher Project.” [1]) finalists stream ciphers, i.e., HC-128 (and HC-256) and Salsa20 on modern Graphics Processor Units (GPUs). On NVIDIAs GPUs we used CUDA programming framework to exploit their many-core architecture on which parallel homogeneous threads are executed in a Single Instruction Multiple Thread (SIMT) fashion. Many cryptographic algorithms, especially block ciphers due to their block wise operations, have reportedly gained remarkable performance speedups on GPUs.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
ECRYPT (2012) eSTREAM: The european network of excellence in cryptology (ECRYPT) Stream cipher project. www.ecrypt.eu.org/stream
Khalid A, Paul G, Chattopadhyay A (2013) New Speed records for Salsa20 stream cipher using an autotuning framework on GPUs. In: Progress in cryptology–AFRICACRYPT. Springer, Berlin, pp 189–207
Khalid A, Bagchi D, Paul G, Chattopadhyay A (2019) Optimized GPU implementation and performance analysis of HC series of stream ciphers. In: Information security and cryptology–ICISC. Springer, Berlin, pp 293–308
ECRYPT eBACS: The european network of excellence in cryptology (ECRYPT) benchmarking of cryptographic systems. http://bench.cr.yp.to/results-stream.html
Bernstein DJ Hash functions and ciphers. In: Notes on the ECRYPT stream cipher project (eSTREAM). http://cr.yp.to/streamciphers/why.html
Wu H (2008) The Stream Cipher HC-128. In: New stream cipher designs. Springer, Berlin, pp 39–47
Bernstein DJ (2008) The Salsa20 family of stream ciphers. In: New stream cipher designs. Springer, Berlin, pp 84–97
Neves S, Arajo F (2009) Cryptography in GPUs, Masters thesis, Universidade de Coimbra, Coimbra
Stefan D (2011) Analysis and implementation of eSTREAM and SHA-3 cryptographic algorithms, PhD dissertation, COOPER UNION
Iwai K, Nishikawa N, Kurokawa T (2012) Acceleration of AES encryption on CUDA GPUs. Int J Netw Comput 2(1):131–145
Nvidia C (2010) C programming guide version 3.2. NVIDIA Corporation, CA
Nvidia C (2009) NVIDIA’s next generation CUDA compute architecture: FERMI. Comput Syst 26:63–72
Manavski S et al. (2007) CUDA compatible GPU as an efficient hardware accelerator for AES cryptography. In: International conference on signal processing and communications (ICSPC). IEEE, pp 65–68
Biagio AD, Barenghi A, Agosta G, Pelosi G (2009) Design of a parallel AES for graphics hardware using the CUDA framework. In: International symposium on parallel and distributed processing (IPDPS). IEEE, pp 1–8
Liu G, An H, Han W, Xu G, Yao P, Xu M, Hao X, Wang Y (2009) A program behavior study of block cryptography algorithms on GPGPU. In: Fourth international conference on frontier of computer science and technology (FCST). IEEE, pp 33–39
Nishikawa N, Iwai K, Kurokawa T (2012) High-performance symmetric block ciphers on multicore CPU and GPUs. Int J Netw Comput 2(2):251–268
Nvidia C (2009) C programming best practices guide. Cuda toolkit, vol 2
Wu H (2004) A new stream cipher HC-256. In: Fast software encryption (FSE). Springer, Berlin, pp 226–244
Chattopadhyay A, Khalid A, Maitra S, Raizada S (2012) Designing high-throughput hardware accelerator for stream cipher HC-128. In: IEEE international symposium on circuits and systems (ISCAS). IEEE, pp 1448–1451
ECRYPT eSTREAM Optimized Code HOWTO (The european network of excellence in cryptology). www.ecrypt.eu.org/stream/perf/#results
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2019 Springer Nature Singapore Pte Ltd
About this chapter
Cite this chapter
Khalid, A., Paul, G., Chattopadhyay, A. (2019). Study of Scalability . In: Domain Specific High-Level Synthesis for Cryptographic Workloads. Computer Architecture and Design Methodologies. Springer, Singapore. https://doi.org/10.1007/978-981-10-1070-5_7
Download citation
DOI: https://doi.org/10.1007/978-981-10-1070-5_7
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-1069-9
Online ISBN: 978-981-10-1070-5
eBook Packages: EngineeringEngineering (R0)